4 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

util.c in rssh 2.3.0 in Debian GNU/Linux does not use braces to make a block, which causes a check for CVS to always succeed and allows rsync and rdist to bypass intended access restrictions in rssh.conf. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346322 http://secunia.com/advisories/21087 http://www.debian.org/security/2006/dsa-1109 http://www.securityfocus.com/bid/18999 https://exchange.xforce.ibmcloud.com/vulnerabilities/25424 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

rssh 2.0.0 through 2.2.3 allows local users to bypass access restrictions and gain root privileges by using the rssh_chroot_helper command to chroot to an external directory. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=344424 http://secunia.com/advisories/18224 http://secunia.com/advisories/18237 http://securityreason.com/securityalert/308 http://www.gentoo.org/security/en/glsa/glsa-200512-15.xml http://www.pizzashack.org/rssh/security.shtml http://www.securityfocus.com/bid/16050 https://exchange.xforce.ibmcloud.com/vulnerabilities/23854 •

CVSS: 7.5EPSS: 2%CPEs: 6EXPL: 2

rssh 2.2.2 and earlier does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via (1) rdist -P, (2) rsync, or (3) scp -S. • https://www.exploit-db.com/exploits/24795 http://marc.info/?l=bugtraq&m=110202047507273&w=2 http://marc.info/?l=bugtraq&m=110581113814623&w=2 http://www.gentoo.org/security/en/glsa/glsa-200412-01.xml http://www.securityfocus.com/bid/11792 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

rssh 2.0 through 2.1.x expands command line arguments before entering a chroot jail, which allows remote authenticated users to determine the existence of files in a directory outside the jail. rssh 2.0 a 2.1.x expanden argumentos de línea de comandos antes de entrar en una jaula chroot, lo que permite a usuarios remotos autenticaos determinar la existencia de de ficheros en un directorio fuera de la jaula. • http://marc.info/?l=bugtraq&m=108787373022844&w=2 http://www.securityfocus.com/bid/10574 https://exchange.xforce.ibmcloud.com/vulnerabilities/16470 •